A UN human rights watchdog called on the Obama administration today to review its use of drones to kill suspected al-Qaeda and Taliban militants abroad and reveal how it chose its targets.

In its first report on Washington’s rights record since 2006, it also called for the prosecution of anyone who ordered or carried out killings, abductions and torture under a CIA programme at the time of President George W. Bush, and to keep a promise to close the detention facility at Guantanamo Bay.

Physical risk is the central issue in recent disputes over the Purple Heart and the recognition of drone pilots. The controversies have helped prompt Defense Secretary Chuck Hagel to order a yearlong study of how the Pentagon awards its ribbons and medals.

Trade and the crisis in Ukraine are likely to dominate the agenda during US President Barack Obama’s first official visit to Brussels on March 26.

But the European Union and Nato leaders also should use the summit to press Obama on another critical issue: ensuring that US operations against terrorist suspects, most often carried out with remotely piloted aircraft known as drones, comply with international law.

The British government should be more transparent about intelligence-sharing that leads to covert drone strikes, say MPs in a report published today.

The call for greater transparency ‘in relation to safeguards and limitations the UK Government has in place for the sharing of intelligence’, came in a report on drones by the Defence select committee. The report acknowledged that intelligence-sharing was outside the committee’s remit and called on the Intelligence and Security Committee to examine the issue.

The report adds that it is ‘vital’ that a ‘clear distinction’ is drawn between UK drone operations and covert strikes such as those conducted by the US in Pakistan, Yemen and Somalia.

The former chief executive of BT, who is now a senior Government trade minister, is at the centre of a row over Britain’s alleged role in America’s secret drones’ war.

Ian Livingston was head of the telecoms giant when it won a contract to set up a top secret £15m communications link between an RAF base in Northamptonshire and America’s headquarters for drone attacks in Africa. Last year he was made Lord Livingston and four months ago started a high-profile trade job in the Department of Business, Innovation and Skills (BIS).

Mr Livingston was head of the telecoms giant when it won a contract to set up a top secret £15m communications link between an RAF base in Northamptonshire and America’s headquarters for drone attacks in Africa. Last year he was made Lord Livingston and four months ago started a high-profile trade job in the Department of Business, Innovation and Skills (BIS).

Drone strikes by the United States seemed to be in the news only sporadically in 2011, when George Brant chanced on a statistic that said the Obama administration was using them at least four times more than the pace they were employed by President George W. Bush. His curiosity ignited, the playwright delved into the subject and emerged with “Grounded,” an award-winning play that explores the life of someone who pushes a kill button while 8,000 miles from the target, then goes home to her family.

In January, Theresa May, the British Home Secretary, secured cross-party support for an alarming last-minute addition to the current Immigration Bill, allowing her to strip foreign-born British citizens of their citizenship, even if it leaves them stateless.

This list is meant as a spiritual successor to the grok.org.uk Full-Disclosure list started by Len Rose and John Cartwright in 2002 and terminated abruptly in March 2014 due to bogus legal threats. We are giving this list a fresh start, so members of the old list need to resubscribe here. “

It is against this background, therefore, that we now await the result of a first tier tribunal appeal by TJ McIntyre which took place last week. This appeal is against the Home Office decision not to allow him to view Home Office material on the possible liability they and/or filtering companies would face for wrongful blocking.

Over the past decade, Ryan Shapiro has become a leading freedom of information activist, unearthing tens of thousands of once-secret documents. His work focuses on how the government infiltrates and monitors political movements, in particular those for animal and environmental rights. Today, he has around 700 Freedom of Information Act requests before the FBI, seeking around 350,000 documents

Putin doesn’t use cell phones. He doesn’t text. He rarely ventures “into that place where you apparently live, that Internet,” according to Time’s Simon Shuster. And that means that he is “a very hard target for foreign spies.” Sound crazy? Well, you didn’t build your career working for the KGB in a country that was unabashed about spying on its citizens.

Russia has taken a fleet of military dolphins trained by the Ukrainian navy, a Russian news agency reports. The Soviet Union’s combat dolphin program has been around since the 1960s, and was handed over to Ukraine after the dissolution of the U.S.S.R. The Ukrainian navy had been planning to disband the program next month, but with Russia’s annexation of Crimea, the dolphins have a new commander to report to—Vladimir Putin.

Natalya Poklonskaya, acting Chief Prosecutor of the Republic of Crimea, has been put on the wanted list in Ukraine. Her name, birth date and photograph appeared on the list of “persons hiding from the Ukrainian authorities”, according to the Ukrainian Interior Ministry’s website.

Ukrainians in the eastern city of Donetsk have voted in an online spoof referendum to secede from Ukraine and join the UK. Residents wrote that their hometown was founded by a Briton, so the UK should seize this “decisive moment” and take them in.

If you were horrified by the revelations of the American National Security Agency (NSA) spying on citizens, world leaders, blue chip technology companies and – oh yeah, the pope – then you’ll be glad that a young researcher working at MIT has developed a way to encrypt all the data that leaves your computer before spies and hackers can get their hands on it.

Stop living in a fear that the NSA, other government agencies, ISPs and hackers will steal your important data & funny-cat videos. MIT engineer Raluca Popa has built a new platform, called Mylar, that helps you build secure NSA-proof web applications. Most of the web applications typically depend on the servers to store and process the data. Anyone who gets access to the server can get control of entire data and there’s nothing you can do about it. Mylar solves this problem through its unique approach to the problem. Mylar stores the data on the server in encrypted form and decrypts it in the user’s browser. Only the intended user can therefore can use the information.

It might be time for the National Security Agency director Keith Alexander to come down from the ivory tower where he sits and be put out to pasture. He and his executive staff are in a world or atmosphere that is disconnected from the practical concerns of everyday life. Just ask our closest allies and their leaders including German Chancellor Angela Merkel.

The U.S. intelligence community is still playing word games with us. The NSA collects our data based on four different legal authorities: the Foreign Intelligence Surveillance Act (FISA) of 1978, Executive Order 12333 of 1981 and modified in 2004 and 2008, Section 215 of the Patriot Act of 2001, and Section 702 of the FISA Amendments Act (FAA) of 2008. Be careful when someone from the intelligence community uses the caveat “not under this program,” or “not under this authority”; almost certainly it means that whatever it is they’re denying is done under some other program or authority. So when De said that companies knew about NSA collection under Section 702, it doesn’t mean they knew about the other collection programs.

Jimmy Carter said that if Edward Snowden were to be convicted and given a death sentence, he would consider pardoning the National Security Agency leaker. He noted, however, that he doesn’t feel he has enough information to judge the extent of the damage Snowden may have done to U.S. national security interests.

Perhaps the most significant component of the proposal is one that has been buried in the media coverage. The new legislation will reportedly require telecommunications companies to give the NSA access to cell phone records, a central preoccupation of the spy agency. US officials disclosed in February that only about 30 percent of all call records are available to the NSA because of the widespread use of cell phones, which have up to now not been part of the information handed over to the government.

The House parliamentarian, who oversees procedural matters, has determined that a new bill that substantially modifies the seminal 1978 Foreign Intelligence Surveillance Act will go through the intelligence committee rather than the judiciary committee, a move that two congressional aides consider “highly unusual.”

So President Obama is finally ready to do something about the government storage of our phone records, preparing legislation for Congress that would partially change the National Security Agency’s bulk collection. Except he’s missing something much more important: all of the other, much more revealing data we generate simply by living our daily lives. What about all of the other data that internet companies buy and sell, and that yet more companies create and sell without even telling us – indeed, all of the rest of a data retention program that you and I helped build?

Facebook may want to become the Internet (as The Verge hypotheses), the real Internet – the geeks – don’t have a very good reputation of The Social Network. The dearth of any geeks on Facebook and mass exodus to Google + shows how much geeks love Facebook. The irony, for Facebook, is that these geeks are the future of the Internet, these geeks play a major role in success or demise of any product and they are not fond of Facebook – this acquisition has showed a very grim picture of Facebook.

Multiple national security leaks by US officials occurred during the production of the Oscar-nominated film, Zero Dark Thirty, which dramatized the hunt for Osama bin Laden that ended in his execution. But, when the Pentagon Inspector General’s office investigated what had happened, the office found then-Pentagon chief Leon Panetta had mishandled classified information.

The criminal enterprise known as Microsoft finds itself embarrassingly exposed in the courtroom, for the IRS belatedly (decades too late) targets the company in an effort to tackle massive tax evasions

A look at some of last week's patent news, with imperative responses that criticise corporate exploitation of patents for protectionism (excluding and/or driving away the competition using legal threats)

Vista 10 to bring new ways for spies (and other crackers) to remotely access people's computers and remotely modify the binary files on them (via Windows Update, which for most people cannot be disabled)